{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:31:50Z","timestamp":1761676310840},"reference-count":76,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4,1]]},"abstract":"<p>Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.<\/p>","DOI":"10.4018\/ijdcf.2015040101","type":"journal-article","created":{"date-parts":[[2015,7,2]],"date-time":"2015-07-02T18:29:05Z","timestamp":1435861745000},"page":"1-19","source":"Crossref","is-referenced-by-count":21,"title":["The State of the Art Forensic Techniques in Mobile Cloud Environment"],"prefix":"10.4018","volume":"7","author":[{"given":"Muhammad","family":"Faheem","sequence":"first","affiliation":[{"name":"University College Dublin, Dublin, Ireland"}]},{"given":"Tahar","family":"Kechadi","sequence":"additional","affiliation":[{"name":"School of Computer Science & Informatics, University College Dublin, Dublin, Ireland"}]},{"given":"Nhien An","family":"Le-Khac","sequence":"additional","affiliation":[{"name":"University College Dublin, Dublin, Ireland"}]}],"member":"2432","reference":[{"key":"ijdcf.2015040101-0","doi-asserted-by":"crossref","unstructured":"Accorsi, R. (2009). Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. IEEE 5th International Conference on IT Security Incident Management and IT Forensics (IMF), (pp. 94-110).","DOI":"10.1109\/IMF.2009.18"},{"key":"ijdcf.2015040101-1","doi-asserted-by":"publisher","DOI":"10.5120\/13504-1253"},{"key":"ijdcf.2015040101-2","doi-asserted-by":"crossref","unstructured":"Albano, P., Castiglione, A., Cattaneo, G., & Santis, A. D. (2011). A novel anti-forensics techniques for the Android OS. IEEE International conference on broadband and wireless computing, communication, and applications, (pp. 380-385).","DOI":"10.1109\/BWCCA.2011.62"},{"key":"ijdcf.2015040101-3","doi-asserted-by":"crossref","unstructured":"Aminnezhad, A., Dehghantanha, A., Abdullah, M. T., & ohsen Damshenas. (2013). Cloud Forensics Issues and Opportunities . International Journal of Information Processing and Management (IJIPM),, 76-85.","DOI":"10.4156\/ijipm.vol4.issue4.9"},{"key":"ijdcf.2015040101-4","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412634"},{"key":"ijdcf.2015040101-5","doi-asserted-by":"crossref","unstructured":"Birk, D. (2011). Technical challenges of forensic investigations in cloud computing environments. IEEE 6th international workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), (pp. 1-10).","DOI":"10.1109\/SADFE.2011.17"},{"key":"ijdcf.2015040101-6","author":"E.Bursztein","year":"2011","journal-title":"Doing Forensics in the Cloud Age Owade: Beyond Files Recovery Forensic"},{"key":"ijdcf.2015040101-7","doi-asserted-by":"crossref","unstructured":"Buyyaa, R., Yeoa, C. S., Venugopala, S., Broberg, J., & Brandic, I. (2009). Cloud Computing and Emerging IT Platform:Vision, Hype, and reality for delivering computing as the 5th utility. Elsevier Transaction on Future generation Computer System, 599-616.","DOI":"10.1016\/j.future.2008.12.001"},{"key":"ijdcf.2015040101-8","unstructured":"Casadei, F., Savoldi, A., & Gubian, P. (2006). Forensics and SIM cards: an Overview. International Journal of Digital Evidence."},{"key":"ijdcf.2015040101-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.015"},{"key":"ijdcf.2015040101-10","first-page":"1","author":"P.Clark","year":"2011","journal-title":"Digital Forensics Tool Testing\u2013Image Metadata in the Cloud"},{"key":"ijdcf.2015040101-11","doi-asserted-by":"crossref","unstructured":"Corrado Federici. (2014). Cloud Data Imager: A unified answer to remote acquisition of cloud storage areas. Elsevier transaction on Digital Investigation, 30-42.","DOI":"10.1016\/j.diin.2014.02.002"},{"key":"ijdcf.2015040101-12","unstructured":"counton2. (n.d.). counton2. Retrieved from www.counton2.com\/story\/26564587\/mobile-cloud-market-worth-4690billion-by-2019-new-report-by-marketsandmarkets"},{"key":"ijdcf.2015040101-13","unstructured":"Daryabar, F., Dehghantanha, A., Udzir, N. I., & Mohd, N. F. (2013). A Survey about Impacts of Cloud Computing on Digital Forensics. International Journal of Cyber-Security and Digital Forensics (IJCSDF), The Society of Digital Information and Wireless Communications, 77-94."},{"key":"ijdcf.2015040101-14","doi-asserted-by":"crossref","unstructured":"Delport, M. K., & Olivier, M. S. (2012). Isolating a cloud instance for a digital forensic investigation. Springer, Advances in Digital Forensics VIII, International Federation for Information Processing (IFIP) Advances in Information and Communication Technology, 187-200.","DOI":"10.1007\/978-3-642-33962-2_13"},{"key":"ijdcf.2015040101-15","first-page":"1","author":"H. T.Dinh","year":"2013","journal-title":"A Survey of Mobile Cloud Computing"},{"key":"ijdcf.2015040101-16","unstructured":"Dykstra, J., & A. Sherman. (2011). Understanding issues in cloud forensics: Two hypothetical case studies. Journal of Network Forensics, 19-31."},{"key":"ijdcf.2015040101-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.001"},{"key":"ijdcf.2015040101-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.001"},{"key":"ijdcf.2015040101-19","doi-asserted-by":"crossref","unstructured":"Dykstra, & Sherman, A. (2012). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digital Investigation,, 90-98.","DOI":"10.1016\/j.diin.2012.05.001"},{"key":"ijdcf.2015040101-20","doi-asserted-by":"crossref","unstructured":"Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. ELSEVIER transaction on Future Generation Computer Systems, Vol. 29, 84-106.","DOI":"10.1016\/j.future.2012.05.023"},{"key":"ijdcf.2015040101-21","first-page":"278","article-title":"Analysis of WeChat on iPhone.","author":"F.Gao","year":"2013","journal-title":"2nd International Symposium on Computer, Communication, Control, and Automation (3CA)"},{"key":"ijdcf.2015040101-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"ijdcf.2015040101-23","unstructured":"Goasduff, L., & Pettey, C. (2012). Gartner says worldwide Smartphone sales soared in fourth quarter of 2011 with 47 percent growth. Gartner, Newsroom, Announcements, press release."},{"key":"ijdcf.2015040101-24","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.592"},{"key":"ijdcf.2015040101-25","doi-asserted-by":"crossref","unstructured":"Grispos, G., Storer, T., & Glisson, W. (n.d.). Calm before the storm: The challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics (IJDCF), 2012.","DOI":"10.4018\/jdcf.2012040103"},{"key":"ijdcf.2015040101-26","doi-asserted-by":"crossref","unstructured":"Grover, J. (2013). Android forensics: automated data collection and reporting from a mobile device. Digital Investigation, proceedings of 13th annual digital forensics research conference, (pp. 12-20).","DOI":"10.1016\/j.diin.2013.06.002"},{"key":"ijdcf.2015040101-27","doi-asserted-by":"crossref","unstructured":"Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., & Hunt, A. (2013). Automated identification of installed malicious android applications. The proceedings 13th annual digital forensics research conference, (pp. 96-104).","DOI":"10.1016\/j.diin.2013.06.011"},{"key":"ijdcf.2015040101-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.006"},{"key":"ijdcf.2015040101-29","article-title":"Forensic Analysis of Distributed Service Oriented Computing Platforms.","author":"R.Hegarty","year":"2011","journal-title":"12th Annual Post-Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting"},{"key":"ijdcf.2015040101-30","unstructured":"IDC. (n.d.). IDC. Retrieved from www.idc.com\/prodserv\/smartphone-os-market-share.jsp"},{"key":"ijdcf.2015040101-31","doi-asserted-by":"crossref","unstructured":"Kent, ]. K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response. Department of Commerce, National Institute of Standards and Technology, Computer Security.","DOI":"10.6028\/NIST.SP.800-86"},{"key":"ijdcf.2015040101-32","doi-asserted-by":"crossref","unstructured":"Khan, A. u., Othman, M., Madani, S. A., & Khan, S. U. (2013). A Survey of Mobile Cloud Computing Applicaiton Models. IEEE communications society, (pp. 393-413).","DOI":"10.1109\/SURV.2013.062613.00160"},{"key":"ijdcf.2015040101-33","doi-asserted-by":"crossref","unstructured":"Lee, J., & Dowon Hong. (2011). Pervasive Forensic Analysis based on Mobile Cloud Computing. IEEE computer society,3rd International Conference on Multimedia Information Networking and Security, (pp. 572-576).","DOI":"10.1109\/MINES.2011.77"},{"key":"ijdcf.2015040101-34","doi-asserted-by":"publisher","DOI":"10.2991\/3ca-13.2013.58"},{"key":"ijdcf.2015040101-35","author":"J.Lessard","year":"2009","journal-title":"Android forensics: Simplifying cell phone examinations"},{"key":"ijdcf.2015040101-36","doi-asserted-by":"crossref","unstructured":"Levinson, A., Stackpole, B., & Johnson, D. (2011). Third party application forensics on apple mobile devices. IEEE proceedings of 44th Hawaii International Conference on System Sciences, (pp. 1-9).","DOI":"10.1109\/HICSS.2011.440"},{"key":"ijdcf.2015040101-37","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5302240"},{"key":"ijdcf.2015040101-38","unstructured":"Lovell, R. (2011). White paper: Introduction to cloud computing. ThinkGrid."},{"key":"ijdcf.2015040101-39","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Liang, X., & Sherman, X. (2010). Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing. ACM, 2010.","DOI":"10.1145\/1755688.1755723"},{"key":"ijdcf.2015040101-40","first-page":"178","article-title":"Cloud application logging for forensics","author":"R.Marty","year":"2011","journal-title":"ACM Symposium on Applied Computing"},{"key":"ijdcf.2015040101-41","doi-asserted-by":"crossref","unstructured":"Me, G. (2008). Internal forensic acquisition for mobile equipment\u201d. IEEE proceedings of the International Symposium on Parallel and Distributed Processing, (pp. 1-7).","DOI":"10.1109\/IPDPS.2008.4536557"},{"key":"ijdcf.2015040101-42","unstructured":"Meng, F., Wu, S., Yang, J., & Yu, G. (2009). Research of an E-mail Forensic and Analysis System Based on Visualization. IEEE 2nd Asia-Pacific Conference on Computational Intelligence and Industrial Applications, (pp. 281-284)."},{"key":"ijdcf.2015040101-43","author":"R. v.Meulen","year":"2013","journal-title":"Gartner says worldwide mobile phone sales declined 1.7 percent in 2012"},{"key":"ijdcf.2015040101-44","first-page":"1","author":"A. F.Michael Armbrust","year":"2009","journal-title":"Above the Clouds: A Berkeley View of Cloud Computing. Technical Report"},{"key":"ijdcf.2015040101-45","doi-asserted-by":"crossref","unstructured":"Mutawa, N. A., Baggili, I., & Marrington, A. (2012). Forensic analysis of social networking applications on mobile devices. Elsevier transaction on Digital Investigation,, 24-33.","DOI":"10.1016\/j.diin.2012.05.007"},{"key":"ijdcf.2015040101-46","unstructured":"NetQin. (2011). Growing conflict between IT and mobility. Retrieved from www.netqin.com\/en\/security\/newsinfo_4094_3.html"},{"key":"ijdcf.2015040101-47","unstructured":"Nielsen. (2012). State of the appnation \u2014a year of change and growth in U.S. Smartphones. Nielsen."},{"key":"ijdcf.2015040101-48","first-page":"100","article-title":"Forensic analysis of the android file system yaffs2.","author":"D.Quick","year":"2011","journal-title":"Proceedings of the 9th Australian digital forensics conference"},{"key":"ijdcf.2015040101-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.07.001"},{"key":"ijdcf.2015040101-50","first-page":"1378","article-title":"Dropbox Analysis.","volume":"\u25aa\u25aa\u25aa","author":"D.Quick","year":"2013","journal-title":"Digital Investigation"},{"key":"ijdcf.2015040101-51","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.02.003"},{"key":"ijdcf.2015040101-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.02.001"},{"key":"ijdcf.2015040101-53","doi-asserted-by":"crossref","unstructured":"Raghav, S., & Saxena, A. K. (2009). Mobile Forensics: Guidelines and Challenges in Data Preservation and Acquisition. Proceedings of Student Conference on Research and Development (SCOReD), (pp. 16-18).","DOI":"10.1109\/SCORED.2009.5443431"},{"key":"ijdcf.2015040101-54","unstructured":"Reese, G. (2010). Cloud Forensics Using EBS Boot Volumes. Retrieved from www.Oreilly.com"},{"key":"ijdcf.2015040101-55","doi-asserted-by":"crossref","unstructured":"Reilly, D., Wren, C., & Berry, T. (2011). Cloud Computing: Pros and Cons for Computer Forensic Investigations. International Journal Multimedia and Image Processing (IJMIP), Infonomics Society, 26-34.","DOI":"10.20533\/ijmip.2042.4647.2011.0004"},{"key":"ijdcf.2015040101-56","unstructured":"Research, D. (2012). The impact of mobile devices on information security: A survey of it professionals."},{"key":"ijdcf.2015040101-57","unstructured":"Research: A. (2009). Mobile Cloud Computing - Next Generation Browsers, Widgets, SIM, Network-as-a-Service, and Platform-as-a-Service, 3Q. Retrieved from http:\/\/www.abiresearch.com\/research\/1003385"},{"key":"ijdcf.2015040101-58","doi-asserted-by":"crossref","unstructured":"Ruan, K., & Carthy, J., & T. Kechadi M. Crosbie. (2011). Cloud forensics An overview. 7th IFIP International Conference on Digital Forensics.","DOI":"10.1007\/978-3-642-24212-0_3"},{"key":"ijdcf.2015040101-59","doi-asserted-by":"crossref","unstructured":"Ruan, K., Carthy, J., Kechadi, T., & Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Elsevier journal on Digital Investigation,, 34-43.","DOI":"10.1016\/j.diin.2013.02.004"},{"key":"ijdcf.2015040101-60","unstructured":"Rubsamen, T., Reich, C., Taherimonfared, A., Wlodarczyk, T., & Chunming Rong. (2013). Evidence for Accountable Cloud Computing Services. Pre-Proceedings of International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFFC)."},{"key":"ijdcf.2015040101-61","unstructured":"Sibiya, G., Venter, H. S., & Thomas Fogwill. (2012). Digital Forensic Framework for a Cloud Environment. IST-Africa Conference Proceedings on International Information Management Corporation (IIMC), (pp. 1-8)."},{"key":"ijdcf.2015040101-62","unstructured":"Son, N., Lee, Y. D., Kim, J. J., Lee, S., & Lee, K. (2010). A study of user data integrity during acquisition of android devices Digital Investigation, DFRWS conference 13th annual digital forensics research conference, (pp. 1-12)."},{"key":"ijdcf.2015040101-63","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.10.003"},{"key":"ijdcf.2015040101-64","doi-asserted-by":"crossref","unstructured":"Taylor, M., Haggerty, J., & Gresty, D. R. H. (2010). Digital evidence in cloud computing systems. Digital Investigation, computer law and security review, (pp. 304-308).","DOI":"10.1016\/j.clsr.2010.03.002"},{"key":"ijdcf.2015040101-65","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70024-1"},{"key":"ijdcf.2015040101-66","first-page":"194","article-title":"Cloud Log Forensics Metadata Analysis. IEEE 36th Annual","author":"S.Thorpe","year":"2012","journal-title":"Computer Software and Applications Conference Workshops (COMPSACW)"},{"key":"ijdcf.2015040101-67","doi-asserted-by":"crossref","unstructured":"Turnbull, B., & Slay, J. (2008). WiFi network signals as a source of digital evidence: Wireless network forensics. IEEE 3rd international conference on Availability, Reliability and Security, (pp. 1355-1360).","DOI":"10.1109\/ARES.2008.135"},{"key":"ijdcf.2015040101-68","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.003"},{"key":"ijdcf.2015040101-69","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chen, I.-R., & Wang, a. D.-C. (2014). A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges. Springer transaction on wireless Personal Communications.","DOI":"10.1007\/s11277-014-2102-7"},{"key":"ijdcf.2015040101-70","first-page":"3","article-title":"Overcast: Forensic Discovery in Cloud Environments.","author":"S. D.Wolthusen","year":"2009","journal-title":"5th International Conference on IT Security Incident Management and IT Forensics, IEEE Computer Society"},{"key":"ijdcf.2015040101-71","doi-asserted-by":"crossref","unstructured":"Yates, M. (2010). Practical Investigations of Digital Forensics Tools for Mobile Devices. ACM conference on Information Security Curriculum Development Conference, (pp. 156- 162).","DOI":"10.1145\/1940941.1940972"},{"key":"ijdcf.2015040101-72","author":"K.Zatyko","year":"2012","journal-title":"The Digital Forensics Cyber Exchange Principle"},{"key":"ijdcf.2015040101-73","doi-asserted-by":"crossref","unstructured":"Zdziarski, J. (2014). Identifying back doors, attack points, and surveillance mechanisms in iOS devices. Elsevier transaction on Digital Investigation,, 3-19.","DOI":"10.1016\/j.diin.2014.01.001"},{"key":"ijdcf.2015040101-74","unstructured":"Zdziarski, J., & Media, O. (2008). iPhone forensics: Recovering evidence, personal data, and corporate assets. Digital Forensics Solutions."},{"key":"ijdcf.2015040101-75","author":"M.Zhu","year":"2011","journal-title":"Mobile Cloud Computing: Implications to Smartphone Forensic Procedures and Methodologies"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=132965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:05:05Z","timestamp":1654142705000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijdcf.2015040101"}},"subtitle":["A Survey, Challenges and Current Trends"],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":76,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2015040101","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,1]]}}}